brief

Results 1 - 25 of 819Sort Results By: Published Date | Title | Company Name
Published By: Apptio     Published Date: Oct 09, 2019
"CIOs are under constant pressure to deliver innovation and efficiency, and at a lower cost to boot. Fortunately, when it comes to enterprise IT spend, chances are the necessary resources to drive improvements are already there, hidden in budget padding. All you need are the right tools to identify and exploit them. Download this brief to: -Understand your budget-to-actual variances and what causes them -Learn how to course-correct towards freeing up fettered funds for growing your business"
Tags : 
    
Apptio
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Modern app delivery for an adaptive, optimized network To succeed in today’s cloud-first world, you need to manage and deploy modern applications in parallel with legacy applications. But traditional application delivery controller (ADC) solutions can’t bridge the gap between these two environments. See and hear how you can streamline the delivery of apps, desktops and data into a unified, fully integrated digital workspace experience. Download this brief to find out how you can: • Get one platform for traditional and modern application delivery • Support hybrid and multi-cloud environments • Convert and migrate legacy apps to microservices application architectures
Tags : 
    
Citrix ShareFile
Published By: Lenovo - APAC     Published Date: Oct 03, 2019
Biometric fingerprint scanners that exceed EPCS security requirements, antimicrobial surfaces, and Quick Clean technology that enables wipe-downs without the shutdown, the ThinkPad T490 Healthcare Edition also boasts impressive audio and video performance, making it the ideal choice to meet the needs of healthcare today. Learn more – download the solution brief
Tags : 
    
Lenovo - APAC
Published By: SailPoint Technologies     Published Date: Oct 01, 2019
Find out how government agencies can use machine learning and artificial intelligence to discover and prevent potential cybersecurity gaps and risks. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload. By integrating the IBM Resilient SOAR Platform with IBM QRadar® Security Intelligence, security teams can build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases.
Tags : 
    
Group M_IBM Q4'19
Published By: Intel     Published Date: Sep 20, 2019
AI is fundamentally reshaping business as we know it. It drives innovation, efficiency, productivity, new operational models, and entirely new revenue opportunities. It is no wonder, then, that enterprises of all sizes are keen to adopt this transformative technology. When embarking on the AI journey, however, it is critical to understand that data is the heart of any effective AI algorithm. So, for any enterprise looking to harness the promise of AI, the first question to ask is quite simply, “is my data ready?” This technology brief simplifies the path to AI by offering actionable steps to data readiness.
Tags : 
    
Intel
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
i. Brief – US based automobile had no asset management and CMDB discovery which lead to longer procurement lifecycles. LTI implemented end to end ServiceNow and operational support using global delivery model. Also helped in optimising integrations after reviewing license consumptions which then helped in reducing the process implementation to mere 2.5 months ii. Benefits 1. Hybrid process governance helped reduction in TCO by 25% 2. Reduction in number of licenses by 20% using integration with SharePoint
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo estão apostando muito em inteligência artificial e machine learning para lhes dar a vantagem tecnológica necessária para obter serviços bancários em tempo real, personalizados e preditivos. Um marco ajudará a diferenciar os primeiros ganhadores e fornecerá vantagens contínuas em inteligência. Faça o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo estão se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que você conhecerá: • 8 tendências que refletem o nível de preparação do banco para a inteligência conectada • 9 armadilhas para evitar e 9 maneiras de pular os obstáculos • Os elementos básicos pessoais, preditivos e em tempo real da IA e ML para os bancos • Líderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso • Orientação essencial do IDC para os bancos líderes
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo están apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnológica que necesitan para ofrecer servicios bancarios más personalizados, predictivos y en tiempo real. Un marco ayudará a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitirá conocer cómo los mejores bancos del mundo se están volviendo más personales, más predictivos, y más en tiempo real que nunca. Lo que usted conocerá: • Las ocho tendencias que reflejan el nivel de preparación de los bancos para la inteligencia conectada • Los nueve obstáculos que evitar y las nueve formas de salvar las brechas • Los elementos básicos personales, predictivos y de tiempo real de la IA y el ML para los bancos • Los líderes destacados de acuerdo con la investigación de IDC Financial Insights y sus respectivos casos de uso • Una guía esencial de IDC para los bancos líderes
Tags : 
    
TIBCO Software
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: Anaplan     Published Date: Sep 10, 2019
Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This finance-focused brief contains: Key findings from finance professionals Challenges faced by finance professionals How they believe they can improve their planning processes
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 10, 2019
Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This Sales-focused brief contains: Key findings from Sales professionals Planning challenges faced by Sales professionals Ideas from Sales leaders about overcoming obstacles and planning more successfully
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 10, 2019
Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This supply chain-focused brief contains: Key findings from supply chain professionals Challenges faced by supply chain professionals How they believe they can improve their planning processes
Tags : 
    
Anaplan
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Every day, employees upload vast numbers of presentations, PDFs, emails and reports to cloud storage providers like Box and Dropbox. Did you know this exposes your organization to serious risk of security breaches and compliance violations? Download this brief to find out the most effective way to close your security gaps.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies
Published By: Cornerstone OnDemand     Published Date: Sep 03, 2019
Year-end performance reviews don’t reflect the feedback and development needs of modern workers. Continuous Performance Management starts with the foundational belief that employees want to perform well and they want to improve, grow and develop in their careers. Read this brief to learn the four steps of how to use continuous performance management for your business.
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Sep 03, 2019
Getting any business off the ground is no small feat. And once you're up and running, the key to survival and long-term success is growth. You have to grow to survive. Read this brief which contains four tips to maximize the chances of success in growing your business.
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Sep 03, 2019
Millennials want to learn, develop, and grow in their careers. For HR leaders, to hold on to your young leaders it is essential to develop a strategic learning program. Read this brief to learn four things a learning program needs to be successful…especially with the millennial workforce.
Tags : 
    
Cornerstone OnDemand
Published By: Akamai Technologies     Published Date: Sep 03, 2019
A brief tour of the financial services criminal economy
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.